General

  • Target

    15974c98339633752c9db78f6ab8b1af95c7de736c9ea48ac5accb91309554e8.bin

  • Size

    390KB

  • Sample

    240809-18fg3asbrl

  • MD5

    6ed91a21e050e9b716cbfe062f9a291f

  • SHA1

    3b0a0b37bbff7e9b21322f88a863361fa1bc32f3

  • SHA256

    15974c98339633752c9db78f6ab8b1af95c7de736c9ea48ac5accb91309554e8

  • SHA512

    0550ab40c90009cbe3e69f648d3ec37e51e45804c681ff35d43b5de644af4759d2267dd2362f166fb42d9bf6edd72b303f98a177c869cb461f0fed5dca22460e

  • SSDEEP

    12288:4r1sUNpMt8iN+ubg6G9hgQyLDSp4hDygsaimSXVM:43zji8ubDWhgDM4hbTSe

Malware Config

Targets

    • Target

      15974c98339633752c9db78f6ab8b1af95c7de736c9ea48ac5accb91309554e8.bin

    • Size

      390KB

    • MD5

      6ed91a21e050e9b716cbfe062f9a291f

    • SHA1

      3b0a0b37bbff7e9b21322f88a863361fa1bc32f3

    • SHA256

      15974c98339633752c9db78f6ab8b1af95c7de736c9ea48ac5accb91309554e8

    • SHA512

      0550ab40c90009cbe3e69f648d3ec37e51e45804c681ff35d43b5de644af4759d2267dd2362f166fb42d9bf6edd72b303f98a177c869cb461f0fed5dca22460e

    • SSDEEP

      12288:4r1sUNpMt8iN+ubg6G9hgQyLDSp4hDygsaimSXVM:43zji8ubDWhgDM4hbTSe

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks